Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 02:20

General

  • Target

    vbs (3).vbs

  • Size

    888KB

  • MD5

    7a3b1d9cf6ea0fb03959c6d3160aaa41

  • SHA1

    d964ca2c51a6b98b857ec1a11830b3d58d8964f2

  • SHA256

    bf65d6b5d594b9a65ee5cc7b9760432fea8abdd4278e61d74a5bdf921678b0b0

  • SHA512

    1973383acdc95e22b9d750d3a5084067a3f330f5ddb168a12ffd13e2464d00c3beae2cb8375fc8a4aac68cecc7a0eccd087b01ec22c649ebc9292fdebdd48063

  • SSDEEP

    12288:2YLY1birWYjdYmYD+lJ3YNDCDZstN9RglY2Y7tsYuxaYBIYa:bUAar1nbvILa

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vbs (3).vbs"
    1⤵
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://tiny.one/financasaudicao
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2040
    • C:\Windows\System32\cmd.exe
      cmd /c start C:\Users\Public\NortonLifeLock\modeling.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Users\Public\NortonLifeLock\modeling.exe
        C:\Users\Public\NortonLifeLock\modeling.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\ManualBox\ScientificCalculator.exe
          C:\ManualBox\ScientificCalculator.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:1684
        • C:\ManualBox\blueView.exe
          C:\ManualBox\blueView.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetWindowsHookEx
          PID:1260

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ManualBox\ScientificCalculator.exe

    Filesize

    17.1MB

    MD5

    6f6072e464f90f4f12432dd4cec04866

    SHA1

    17fe9cdd20a64fec5d471f6878a462a2ef0af212

    SHA256

    2cf983a131a11d33c86c7930fe6001be3415c690a9c3a0c54573137181e242e1

    SHA512

    962f4342b451e531108c8d8e67fe88a13da0ad0da774d0dda1e223ebd5122411b7fe71c69aa7e599c54752465681db6ed5e2c43eefccac5a80574ebe67ba1dfc

  • C:\ManualBox\blueView.exe

    Filesize

    5.1MB

    MD5

    94513b57b45e54901d1de05e39e1d0d8

    SHA1

    41ab10d5e057e714d8caad5855c115f5bef76097

    SHA256

    3a6e92e50ac8c34636d8e7a6ddcb74f7e28dd68cccfc27428b217846a3e5bff1

    SHA512

    53ce5deaedbdcfc2e6aeb66b19e040ddf20c8a268990a7d1fb62fad930b3c4dcc2454cbcb20659f1937b473f56d3f4fbe4f71a709afaa9f38c4f8be59ac9ac26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

    Filesize

    471B

    MD5

    58aa65696a745e5ece26263451b60d24

    SHA1

    705401ee8f90840abd4ce4b41224c201d4dc790e

    SHA256

    ad69150a1261a181dd2fa6bf7e8195d28217afbe96c671d24ff7aa8bf00bc7b4

    SHA512

    c426100e7a81605c62fde337ee41eb03fdda970982cb97789751002fe1409f62b38a2be9977d6f4895eedfde1284bc6ffe46ac795e4f9d60c187068ac603cd78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ad81d3640af527748ca04e243b9553e3

    SHA1

    1a9edca48e145eaffeafc1227b596cf8eaa42a7c

    SHA256

    653261cc236592f14f30d6310e06eebd50842bd1085ab8a8af3979ea667f4302

    SHA512

    c4c97124482814c02fe1a1936ccba29101e0acb635078e1cf69f6b84201ad08e457f267ec865ad62a3513d11305ba96c5e47da705681bb8b34d7b8d0cef3e385

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7a73380be0e69c8415aa8d9f6187125

    SHA1

    7940076749a99e293b7b41373cd59a2075597c70

    SHA256

    bef4f415ae523bc629e8359d462c3f58165c3f29670347639df15265ff0dddb1

    SHA512

    0d7d244b1d16aada6734eb3eeef1d48c0586371004b12aefa41cab005a1f1a7a6df78a84c56ba99beca1c39cab94ac8c319ea6a95fd187b59119d9b9096d242a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e40687c192dc98174e9a2b1ba30b48c

    SHA1

    1e181aa0d21abd154ecd6e27b36a8a969362feb0

    SHA256

    a55a11e4aae75fa64eeffd420d96bba9cf6a068d0273abae1510c6440f380e92

    SHA512

    aba9912d265ac673f8b684bffd41618a43d1c9de9b5e263855811bf1e5534985f06b2a9933186455a9a5f5178f360c0ae618a996e53109b4b92bb81d5298313a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04

    Filesize

    400B

    MD5

    14b01866947f011088e8b3e85f636f51

    SHA1

    d0a8b11e956ee8f478ed29b49d18234f91787a6d

    SHA256

    b31d15146797638e8199856a85c5ca47ed1d668f29dd5cbaa45289931c007bc7

    SHA512

    d97d0e614d7113970f04bac4246ae74939a93b4abc462f617859fb82e730899a5474282d76e644397bf24b18aee942ff4deaf605327fbc242059edda7a7bf5eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    39818a5f95a7d2a09b708baa8eaefdae

    SHA1

    f10d62daa6f403518f7051c94eb99acf365ad427

    SHA256

    1349334b1ec1312070ee309206950f4cea02cb023512db2134c76664d3bd7034

    SHA512

    7742614c47ab9412413718afe01323823fa0f288bd5abd86df4850c76c2f05f070f1f3e5ccb1054ae11f71a088c44087b77fdb89efa1402fccda2d765fd40e9c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\808FBC3Z.txt

    Filesize

    539B

    MD5

    8007fd9772130c6c8ff4fd3c19ec934b

    SHA1

    52d5a995fed6f694057f63f8478f6d9d86368f01

    SHA256

    354856a0050e1ac845cd4a787e4ea7174524a89b3a671765d68ed22dd94ed6a3

    SHA512

    1766cb002ddd1fe7d1b5a00881a467074b1c7586631a622b6f8c63530855c40fbbd41b7a4717a805babe63b6d2f2c7a6d90ca4af8dcbde3981723469ea7e5def

  • C:\Users\Public\NortonLifeLock\modeling.exe

    Filesize

    4.4MB

    MD5

    e0b670005db2d2eef16a5366deae18a8

    SHA1

    26be17aef483d553c0e5678e35611b019acd28a3

    SHA256

    354c109f7a129a45895fc2d4c2abc10cf20d66be19d28708e7dabaeef193fef6

    SHA512

    6dfee2d4a6f8b503b19a993db1bc2c1b944dc596f76aa1f5b41882246c785eac71607766ac250b2a7cf43b2ee353584a3cabb3299b39da5e20008745221d62a4

  • \ManualBox\ScientificCalculator.exe

    Filesize

    17.1MB

    MD5

    6f6072e464f90f4f12432dd4cec04866

    SHA1

    17fe9cdd20a64fec5d471f6878a462a2ef0af212

    SHA256

    2cf983a131a11d33c86c7930fe6001be3415c690a9c3a0c54573137181e242e1

    SHA512

    962f4342b451e531108c8d8e67fe88a13da0ad0da774d0dda1e223ebd5122411b7fe71c69aa7e599c54752465681db6ed5e2c43eefccac5a80574ebe67ba1dfc

  • \ManualBox\ScientificCalculator.exe

    Filesize

    17.1MB

    MD5

    6f6072e464f90f4f12432dd4cec04866

    SHA1

    17fe9cdd20a64fec5d471f6878a462a2ef0af212

    SHA256

    2cf983a131a11d33c86c7930fe6001be3415c690a9c3a0c54573137181e242e1

    SHA512

    962f4342b451e531108c8d8e67fe88a13da0ad0da774d0dda1e223ebd5122411b7fe71c69aa7e599c54752465681db6ed5e2c43eefccac5a80574ebe67ba1dfc

  • \ManualBox\blueView.exe

    Filesize

    5.1MB

    MD5

    94513b57b45e54901d1de05e39e1d0d8

    SHA1

    41ab10d5e057e714d8caad5855c115f5bef76097

    SHA256

    3a6e92e50ac8c34636d8e7a6ddcb74f7e28dd68cccfc27428b217846a3e5bff1

    SHA512

    53ce5deaedbdcfc2e6aeb66b19e040ddf20c8a268990a7d1fb62fad930b3c4dcc2454cbcb20659f1937b473f56d3f4fbe4f71a709afaa9f38c4f8be59ac9ac26

  • \Users\Public\NortonLifeLock\modeling.exe

    Filesize

    4.4MB

    MD5

    e0b670005db2d2eef16a5366deae18a8

    SHA1

    26be17aef483d553c0e5678e35611b019acd28a3

    SHA256

    354c109f7a129a45895fc2d4c2abc10cf20d66be19d28708e7dabaeef193fef6

    SHA512

    6dfee2d4a6f8b503b19a993db1bc2c1b944dc596f76aa1f5b41882246c785eac71607766ac250b2a7cf43b2ee353584a3cabb3299b39da5e20008745221d62a4

  • memory/1048-54-0x000007FEFBEE1000-0x000007FEFBEE3000-memory.dmp

    Filesize

    8KB

  • memory/1076-56-0x0000000000000000-mapping.dmp

  • memory/1260-71-0x0000000000000000-mapping.dmp

  • memory/1684-66-0x0000000000000000-mapping.dmp

  • memory/1996-58-0x0000000000000000-mapping.dmp